Author of the publication

Vulnerability of the conventional accessible CAPTCHA used by the White House and an alternative approach for visually impaired people.

, , , , and . SMC, page 3946-3951. IEEE, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure Hierarchical Bitcoin Wallet Scheme Against Privilege Escalation Attacks., , , , and . DSC, page 1-8. IEEE, (2018)Risk of Re-Identification Based on Euclidean Distance in Anonymized Data PWSCUP2015., and . NBiS, volume 7 of Lecture Notes on Data Engineering and Communications Technologies, page 901-913. Springer, (2017)Electronic Auctions with Private Bids., , and . USENIX Workshop on Electronic Commerce, USENIX Association, (1998)Secure Asymmetric Watermark Detection Without Secret of Modified Pixels., and . WISA, volume 3786 of Lecture Notes in Computer Science, page 165-178. Springer, (2005)How Many Malicious Scanners Are in the Internet?, and . WISA, volume 4298 of Lecture Notes in Computer Science, page 381-390. Springer, (2006)How Much is Risk Increased by Sharing Credential in Group?, , and . STM, volume 10547 of Lecture Notes in Computer Science, page 103-117. Springer, (2017)Privacy-Preserving Decision Tree Learning with Boolean Target Class., , , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 98-A (11): 2291-2300 (2015)SWIPASS: Image-Based User Authentication for Touch Screen Devices., , , and . J. Inf. Process., 24 (2): 227-236 (2016)(M+1)st-Price Auction Protocol.. IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 85-A (3): 676-683 (2002)Identification of incompletely specified multiple-valued Kleenean functions., , , and . IEEE Trans. Syst. Man Cybern. Part A, 28 (5): 637-647 (1998)